Industry News

When was the last time you got help with your strategic planning in IT? “What?” you say. “Strategic plans are for the sales and marketing team and the executive retreat. Our IT team is there to help us keep the lights on and maintain business-as-usual conditions. When they want to upgrade a system they put

READ MORE

We’re proud to announce the opening of our NSW office in the heart of Sydney’s CBD at 133 Castlereagh Street. Having served our southern clients for more than a decade from our Brisbane office, our new presence adds a local touch to our nationwide scope and comes in the wake of an increasing number of

READ MORE

A new report by Verizon continues to confirm that the human is the weakest link in any network security chain. The Verizon Enterprise 2017 Data Breach Digest contains numerous accounts of real-life stories of data breaches, corporate theft, million-dollar scams and emergency responses to contain and remedy the situations. The document presents some key metrics

READ MORE

Just yesterday, the Federal Government passed an amendment to the Privacy Act that requires organisations with turnover of $3m or more to publicly disclose they’ve suffered a data breach with respect to personal information of clients, employees, research participants and more. The change comes after 4 years of trying to get an amendment passed, with

READ MORE

Last week it emerged that 3 out of a group of 4 health services whose disaster recovery preparations have been assessed by the Queensland Audit Office have only basic DR measures in place. Computerworld reports that Cairns, Mackay and South West Hospitals and Health Services only scored a 1 on the capability maturity model used

READ MORE

Ransomware attacks have quadrupled in the past year because companies like yours are paying up! A report released by insurance underwriter Beazley last week found the lure of an easy pay-day, combined with the ease of buying easy-to-operate ransomware kits, had made the attacks a real growth industry for cyber-criminals. “From what we are seeing,

READ MORE

Digital video recorders (DVRs) and IP cameras were the unlikely weapons of a global cyber-attack that brought one of the internet’s biggest players to its knees. The distributed denial of service (DDoS) attack against US domain name server (DNS) provider Dyn occurred late last week [October 22]. It caused congestion, and service outages to many

READ MORE

Hackers are now increasingly targeting attacks at small to mid-range enterprises. Why? Because it’s easy, and it gives cyber-criminals a better chance of infiltrating other bigger networks – including those of your clients – using your circle of trust. That’s just one of the findings released in the latest Australian Cyber Security Centre (ACSC) threat

READ MORE

Hackers can now use your own employees’ smartphones against you to launch digital espionage attacks, and hijack sensitive corporate information using a Trojan horse called DressCode. Security specialists Trend Micro report the malware allows hackers to bypass your Firewalls by accessing connected internal networks through the compromised device, which are already beyond the router. It

READ MORE

We’re pleased to announce that we can now develop custom software and business reporting tools for your company. We have expanded our range of products and services based on market feedback from our clients that they need to innovate and become more agile with the help of IT. Our new team members are experienced programmers

READ MORE

As reported in IT News, malware that has a very specific purpose has been found lurking in the Google Play store. It’s called Overseer, and it’s designed to target business travellers going overseas. It steals lots of information for a very specific purpose. Once installed on a user’s Android device, Overseer collects and sends back

READ MORE

In IT Security, two industry terms deserve a bit of explaining. They are: What is an Attack Vector? An “Attack Vector” is the IT industry’s term for describing the path that a hacker or a malware application might follow to infiltrate your IT network and compromise your data.  Attack Vectors exploit systemic vulnerabilities and human

READ MORE

Headlines keep saying that the Internet of Things, billions of web-enabled devices that share information via cloud services, is coming. The fact is, it’s already here. From mining companies using thousands of sensors on plant and machinery to refine their maintenance schedules through to the IP camera that your business just installed beside the front

READ MORE

Did you know that the average user looks at their mobile device more than 50 times per day? It’s more than you’d think, but if you count the number of times you do it, you’ll see it’s an accurate figure. That’s up from a 2013 Deloitte study that calculated 33 looks per day in 2014

READ MORE